Helpful Videos for Security+ (SYO-701)



Below you will find video resources broken down by each Security+ Domain. The videos are created by Professor Messer, who is the web’s foremost CompTIA guru.

During your review of the Exam Objectives, if you do not feel complete confidence in your knowledge of a domain subject area, the Professor Messer can be an ideal tool to gain quick, concise knowledge. Take advantage of this resource. Many individuals have found the Professor Messer video resources to be an exceptional augmentation tool during the exam study process.

  • DOMAIN 1.0

    General Security Concepts

VIDEO TOPIC VIDEO LINK DOMAIN
How to Pass Your SY0-701 Security+ Exam https://www.youtube.com/watch?v=KiEptGbnEBc&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv 1
Security Controls https://www.youtube.com/watch?v=STM3EUvL7wg&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=2 1
The CIA Triad https://www.youtube.com/watch?v=SBcDGb9l6yo&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=3 1
Non-Repudiation https://www.youtube.com/watch?v=XxnCxPEllMg&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=4 1
Authentication, Authorization, and   Accounting https://www.youtube.com/watch?v=AhaZtj5P2a8&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=5 1
Gap Analysis https://www.youtube.com/watch?v=cuTVyyS5C7M&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=6 1
Zero Trust https://www.youtube.com/watch?v=zC_Pndpg8-c&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=7 1
Physical Security https://www.youtube.com/watch?v=YtT8q2mUM9c&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=8 1
Deception and Disruption https://www.youtube.com/watch?v=X_qfMVty4ts&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=9 1
Change Management https://www.youtube.com/watch?v=48wRbMdHFVI&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=10 1
Technical Change Management https://www.youtube.com/watch?v=H9TYNjcpl-0&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=11 1
Public Key Infrastructure https://www.youtube.com/watch?v=xHAMEF7-inQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=12 1
Encrypting Data https://www.youtube.com/watch?v=jpsc4c7lntw&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=13 1
Key Exchange https://www.youtube.com/watch?v=U6BWn81P5Ec&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=14 1
Encryption Technologies https://www.youtube.com/watch?v=u61J0xR_XPU&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=15 1
Obfuscation https://www.youtube.com/watch?v=LfuTMzZke4g&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=16 1
Hashing and Digital Signatures https://www.youtube.com/watch?v=EcGmQjl6XEo&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=17 1
Block chain Technology https://www.youtube.com/watch?v=-wqU_2ToP1M&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=18 1
Certificates https://www.youtube.com/watch?v=cLa94BZH_9s&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=19 1


  • DOMAIN 2.0

    Threats, Vulnerabilities, and Mitigations

VIDEO TOPIC VIDEO LINK DOMAIN
Threat Actors https://www.youtube.com/watch?v=6xUH0t6ugIM&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=20 2
Common Threat Vectors https://www.youtube.com/watch?v=4lAbGpTDZ18&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=21 2
Phishing https://www.youtube.com/watch?v=9SD6DRCKZFU&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=22 2
Impersonation https://www.youtube.com/watch?v=X3yoNAVuKwA&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=23 2
Watering Hole Attacks https://www.youtube.com/watch?v=z413PV6l_Ys&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=24 2
Other Social Engineering Attacks https://www.youtube.com/watch?v=akoDmeV3LQo&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=25 2
Memory Injections https://www.youtube.com/watch?v=kBcTczu8FsM&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=26 2
Buffer Overflows https://www.youtube.com/watch?v=0-qeeI5jTqU&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=27 2
Race Conditions https://www.youtube.com/watch?v=MKptc1lPSw8&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=28 2
Malicious Updates https://www.youtube.com/watch?v=KbtUrdBy9Yo&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=29 2
Operating System Vulnerabilities https://www.youtube.com/watch?v=narir8qpGq8&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=30 2
SQL Injection https://www.youtube.com/watch?v=qFUOLkEk8AQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=31 2
Cross-Site Scripting https://www.youtube.com/watch?v=PKgw0CLZIhE&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=32 2
Hardware Vulnerabilities https://www.youtube.com/watch?v=TaTaEvqjjDM&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=33 2
Virtualization Vulnerabilities https://www.youtube.com/watch?v=t2JrPrzRDLA&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=34 2
Cloud-Specific Vulnerabilities https://www.youtube.com/watch?v=V2DCYO-sWRQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=35 2
Supply Chain Vulnerabilities https://www.youtube.com/watch?v=WqvCJLpwExY&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=36 2
Misconfiguration Vulnerabilities https://www.youtube.com/watch?v=NBKzlUqzVmE&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=37 2
Mobile Device Vulnerabilities https://www.youtube.com/watch?v=DRfAwwdzYpU&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=38 2
Zero-Day Vulnerabilities https://www.youtube.com/watch?v=FDFxGLnZtoY&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=39 2
An Overview of Malware https://www.youtube.com/watch?v=-eZs8wjjGGE&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=40 2
Viruses and Worms https://www.youtube.com/watch?v=Su8ANmAoerU&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=41 2
Spyware and Bloatware https://www.youtube.com/watch?v=-VmI3xFJw78&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=42 2
Other Malware Types https://www.youtube.com/watch?v=nu27ovJ5rqw&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=43 2
Physical Attacks https://www.youtube.com/watch?v=oIpOuTX2HRs&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=44 2
Denial of Service https://www.youtube.com/watch?v=Z7OntvK–PQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=45 2
DNS Attacks https://www.youtube.com/watch?v=BoxeL5ybOXI&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=46 2
Wireless Attacks https://www.youtube.com/watch?v=tSLqrKhUvts&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=47 2
On-Path Attacks https://www.youtube.com/watch?v=M_Af6_8JTuo&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=48 2
Replay Attacks https://www.youtube.com/watch?v=ai6qS13gKRo&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=49 2
Malicious Code https://www.youtube.com/watch?v=xDhUBQ_lnUA&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=50 2
Application Attacks https://www.youtube.com/watch?v=yRSqIGjeb7s&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=51 2
Cryptographic Attacks https://www.youtube.com/watch?v=7aJaEQy6Yoc&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=52 2
Password Attacks https://www.youtube.com/watch?v=-ZfbifHwEVE&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=53 2
Indicators of Compromise https://www.youtube.com/watch?v=x72hG9GvkaQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=54 2
Segmentation and Access Control https://www.youtube.com/watch?v=yDeDGCh_PDs&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=55 2
Mitigation Techniques https://www.youtube.com/watch?v=Fc8ZJfmapbI&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=56 2
Hardening Techniques https://www.youtube.com/watch?v=wXoC46Qr_9Q&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=57 2


  • DOMAIN 3.0

    Security Architecture


VIDEO TOPIC VIDEO LINK DOMAIN
Cloud Infrastructures https://www.youtube.com/watch?v=8qpQ8Q6xxiU&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=58 3
Network Infrastructure Concepts https://www.youtube.com/watch?v=jd001Hj7XWM&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=59 3
Other Infrastructure Concepts https://www.youtube.com/watch?v=HDiNPPrGhzE&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=60 3
Infrastructure Considerations https://www.youtube.com/watch?v=Ap3Z_0ZdqpQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=61 3
Secure Infrastructures https://www.youtube.com/watch?v=l64La1xYXL4&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=62 3
Intrusion Prevention https://www.youtube.com/watch?v=7QuYupuic3Q&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=63 3
Network Appliances https://www.youtube.com/watch?v=WlOslEy3ztg&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=64 3
Port Security https://www.youtube.com/watch?v=QhLQ6J4satw&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=65 3
Firewall Types https://www.youtube.com/watch?v=mq1HRM-zGtQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=66 3
Secure Communication https://www.youtube.com/watch?v=uU3e_ntg-3g&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=67 3
Data Types and Classifications https://www.youtube.com/watch?v=R0W0_gZCVzk&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=68 3
States of Data https://www.youtube.com/watch?v=71RQaYQ4QSw&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=69 3
Protecting Data https://www.youtube.com/watch?v=leX_Qa7wqB4&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=70 3
Resiliency https://www.youtube.com/watch?v=sb0dRaQbuBA&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=71 3
Capacity Planning https://www.youtube.com/watch?v=WGlT6-gNwqY&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=72 3
Recovery Testing https://www.youtube.com/watch?v=IhT7Odu4xHc&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=73 3
Backups https://www.youtube.com/watch?v=8mGSwRScqIM&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=74 3
Power Resiliency https://www.youtube.com/watch?v=-EY45MimSBM&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=75 3


  • DOMAIN 4.0

    Security Operations

VIDEO TOPIC VIDEO LINK DOMAIN
Secure Baselines https://www.youtube.com/watch?v=BWPJD9Eb9iE&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=76 4
Hardening Targets https://www.youtube.com/watch?v=YQKbs0ug0XQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=77 4
Securing Wireless and Mobile https://www.youtube.com/watch?v=iAR6SgvtezY&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=78 4
Wireless Security Settings https://www.youtube.com/watch?v=KaqKoKNEKnE&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=79 4
Application Security https://www.youtube.com/watch?v=fFvXy3WkLpA&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=80 4
Asset Management https://www.youtube.com/watch?v=BJ2UMB4a04g&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=81 4
Vulnerability Scanning https://www.youtube.com/watch?v=9B0mtWk_AM0&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=82 4
Threat Intelligence https://www.youtube.com/watch?v=86fruE9jkKk&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=83 4
Penetration Testing https://www.youtube.com/watch?v=-LevHAzXgFs&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=84 4
Analyzing Vulnerabilities https://www.youtube.com/watch?v=eyVy1gKCuAU&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=85 4
Vulnerability Remediation https://www.youtube.com/watch?v=P9xakfmX70c&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=86 4
Security Monitoring https://www.youtube.com/watch?v=np2WI_rM-Ok&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=87 4
Security Tools https://www.youtube.com/watch?v=nNiNTviiacU&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=88 4
Firewalls https://www.youtube.com/watch?v=VgNyh4HEqSU&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=89 4
Web Filtering https://www.youtube.com/watch?v=I_c0D49uCwQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=90 4
Operating System Security https://www.youtube.com/watch?v=4dpTyRM6BU8&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=91 4
Secure Protocols https://www.youtube.com/watch?v=9NAKCyOtFH0&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=92 4
Email Security https://www.youtube.com/watch?v=v6ht9efsnRI&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=93 4
Monitoring Data https://www.youtube.com/watch?v=ZDJ-BLPLWq4&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=94 4
Endpoint Security https://www.youtube.com/watch?v=83pCkSSj1IQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=95 4
Identity and Access Management https://www.youtube.com/watch?v=ZoOyyqhptik&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=96 4
Access Controls https://www.youtube.com/watch?v=9ANHcZwJfdQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=97 4
Multifactor Authentication https://www.youtube.com/watch?v=MpIzA4fNWew&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=98 4
Password Security https://www.youtube.com/watch?v=eMOe-PLBy1k&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=99 4
Scripting and Automation https://www.youtube.com/watch?v=R9ojg881dLs&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=100 4
Incident Response https://www.youtube.com/watch?v=X2UiMLxRdhE&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=101 4
Incident Planning https://www.youtube.com/watch?v=CYFe16lCRMk&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=102 4
Digital Forensics https://www.youtube.com/watch?v=UtDWApdO8Zk&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=103 4
Log Data https://www.youtube.com/watch?v=EDru1LTYDJw&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=104 4


  • DOMAIN 5.0

    Security Program Management and Oversight

VIDEO TOPIC VIDEO LINK DOMAIN
Security Policies https://www.youtube.com/watch?v=5kY9kvzeWjA&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=105 5
Security Standards https://www.youtube.com/watch?v=jBvdRpXaomk&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=106 5
Security Procedures https://www.youtube.com/watch?v=vJINnOZyQNg&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=107 5
Security Considerations https://www.youtube.com/watch?v=4tGFraaP48Q&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=108 5
Data Roles and Responsibilities https://www.youtube.com/watch?v=gxNi-04yP8Q&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=109 5
Risk Management https://www.youtube.com/watch?v=cLhUMoQS1a8&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=110 5
Risk Analysis https://www.youtube.com/watch?v=Ykx7t54y-oo&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=111 5
Risk Management Strategies https://www.youtube.com/watch?v=pmyuWY7Pbag&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=112 5
Business Impact Analaysis https://www.youtube.com/watch?v=myI-v3mj7Kc&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=113 5
Third-Party Risk Assessment https://www.youtube.com/watch?v=13KNjPexnEI&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=114 5
Agreement Types https://www.youtube.com/watch?v=HSZxjj1YAh8&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=115 5
Compliance https://www.youtube.com/watch?v=IjJf4jLtONQ&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=116 5
Privacy https://www.youtube.com/watch?v=WGXrbAh0LUI&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=117 5
Audits and Assessments https://www.youtube.com/watch?v=uo2Yw720mv4&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=118 5
Penetration Tests https://www.youtube.com/watch?v=wEMzVfwBiWY&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=119 5
Security Awareness https://www.youtube.com/watch?v=W_Npxwk4fbI&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=120 5
User Training https://www.youtube.com/watch?v=WQRZMMLUkGE&list=PLG49S3nxzAnl4QDVqK-hOnoqcSKEIDDuv&index=121 5

© Copyright 2023 - ECPI University